From b47d5056899225522a4bc644735cf94e2e908a0e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Sat, 13 Jan 2018 13:35:13 +0100 Subject: [PATCH] AMD now vuln to variant2 (as per their stmt) --- spectre-meltdown-checker.sh | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 7199de8..87838c3 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -8,7 +8,7 @@ # # Stephane Lesimple # -VERSION=0.28 +VERSION=0.29 # Script configuration show_usage() @@ -158,8 +158,10 @@ is_cpu_vulnerable() variant1=0 variant2=0 variant3=0 + if grep -q AMD /proc/cpuinfo; then - variant2=1 + # AMD revised their statement about variant2 => vulnerable + # https://www.amd.com/en/corporate/speculative-execution variant3=1 elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then # ARM @@ -188,6 +190,7 @@ is_cpu_vulnerable() fi fi fi + [ "$1" = 1 ] && return $variant1 [ "$1" = 2 ] && return $variant2 [ "$1" = 3 ] && return $variant3